Hi, Currently I am Using Fortimail 200D in HA (master-Slave).Its working
fine. I have quarantine my spam email after checking legitimate email I
release them. But issue is that when fortimail receive an email and
relayed after receive I want resend t...
Hi, Previously, I was using Cisco both sides HO and Site A and
connectivity established with gre tunnel . But recently I have purchased
100D for HO Office and I have tried established gre tunnel but
unfortunately gre tunnel could not be established.C...
HI, I have 100D with HA, its work properly.recently I integrates AD with
fortigate through FSSO applications. My FSSO connectivity fine and I can
monitor all user in fortigate in the users tab User & Devices >>Monitor
>>Firewall and Check on FSSO all...
Hi, I have FG110C in HO and and I have IPsec client on different
places.I have created IPsec policy based VPN tunnel in HO and working
properly. Issue is that, if more than one client dial IPsec tunnel
behind single ISP so, only one client connect at...
Hi Everyone, I have two fortiGate FG110C in HO and FG50B in Branch
side.I have created IPsec route based tunnel Vpn successfully, but
problem is that both side have same subset but different IPs HO side
have assign ip series 192.168.1.1-80/24 and bra...
hi, Fortigate is a UTM Network security firewall, But it's have many
features e,g routing,VPN and more and some models support modem inteface
also. so you can use all features of fortigate as you want. Zohaib
Hi, Just create VPN Tunel as simple both side after that , In headoffice
site, edit phaseII>>quick mode and enter source address 0.0.0.0/0 and in
destination enter remote site subnet(e.g 192.168.1.0/24), and In Remote
site PhaseII>>quick mode source ...
HI, You can Simple create vlan go to System>>Interface>create new assign
VlanID,name and select interface and press ok.you can not assign IP
address because of transparent mode, and just create policy to allow
traffic. Thanks,Zohaib KhanFCSNA,CCNA,MC...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.